<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Detection of multi-vector attacks in IoT networks: a graph attention network-based approach⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mykola Stetsiuk</string-name>
          <email>mykola.stetsiuk@khmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Klots</string-name>
          <email>klots@khmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Tymoshchuk</string-name>
          <email>dmytro.tymoshchuk@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mikolaj Karpinski</string-name>
          <email>mikolaj.karpinski@uken.krakow.pl</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>11, Instytuts'ka str., Khmelnytskyi, 29016</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ternopil Ivan Puluj National Technical University</institution>
          ,
          <addr-line>56, Ruska str. Ternopil, 46001</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of the National Education Commission</institution>
          ,
          <addr-line>2 Podchorążych str, Krakow, 30084</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>This paper addresses the challenge of detecting multi-vector attacks in Internet of Things (IoT) networks by leveraging Graph Attention Networks (GAT). A novel method is proposed for modeling IoT infrastructure as a weighted directed graph that captures not only the physical topology but also logical relationships and dynamic interactions between devices. Nodes represent heterogeneous IoT elements including end devices, routers, and gateways - while edges denote communication channels with assigned weights based on telemetry features. The method introduces a structured representation of telemetry in the form of feature vectors extracted from time-series data, enabling the detection of behavioral deviations at both node and network levels. Multi-vector attacks are formalized as transformations of the graph's structure and dynamics, allowing for the analysis of complex propagation chains involving devices, links, and control nodes. A GAT-based architecture is developed to process these representations, applying attention mechanisms to identify relevant contextual dependencies in the graph. The proposed detection pipeline consists of a telemetry converter, an interpreter for node classification, and a training module based on binary cross-entropy loss. Experimental validation was conducted using real-world datasets, covering a wide range of attack scenarios and device types. Comparative analysis with other graph-based methods (GCN, GraphSAGE, GAE) demonstrates the competitiveness of GAT in terms of accuracy, F1 score, and ROC-AUC - achieving a ROC-AUC of 0.955 while maintaining interpretability and scalability.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;IoT security</kwd>
        <kwd>anomaly detection</kwd>
        <kwd>network traffic analysis</kwd>
        <kwd>machine learning</kwd>
        <kwd>GAT</kwd>
        <kwd>GNN</kwd>
        <kwd>intrusion detection</kwd>
        <kwd>cybersecurity1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Internet of Things (IoT) devices are widely used in smart homes [
        <xref ref-type="bibr" rid="ref1">1,2</xref>
        ], agriculture [3,4], logistics
[5,6], healthcare [7,8], city infrastructure [9,10], and for monitoring environmental parameters
[1113], enabling real-time interaction between the physical and digital levels. The rapid growth of the
IoT has led to the formation of heterogeneous, dynamic environments with limited-resource
devices, open interfaces, and minimal protection. This makes such systems vulnerable to
multivector attacks that exploit various layers — from end nodes to routing and control logic.
Traditional detection systems based on signatures or anomalies often prove ineffective due to
delays in creating new signatures, a lack of labeled data, and frequent changes in topology. To
overcome these limitations, machine learning-based approaches are a promising method. Machine
learning methods have become widespread in various fields, including materials science [14–18],
medicine [
        <xref ref-type="bibr" rid="ref2">19–21</xref>
        ], financial analytics [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">22–24</xref>
        ], engineering [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">25–27</xref>
        ], and cybersecurity [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">28–30</xref>
        ].
      </p>
      <p>Approaches to detecting intrusions in IoT networks increasingly rely on deep learning. A
promising direction is the use of graph neural networks (GNNs). Among them, graph attention
networks (GAT) provide selective aggregation of information from neighboring nodes. This paper
proposes a GAT-based model for detecting multi-vector attacks in IoT networks by combining
graph representations with device telemetry. The method formalizes both physical and logical
topologies to detect anomalies in nodes and interactions between devices using real IoT data with
attack scenarios.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Overview of detection and protection methods</title>
      <p>To develop an effective approach for detecting multivector attacks in IoT networks, existing
research in this field has been analyzed.</p>
      <p>
        In the article [
        <xref ref-type="bibr" rid="ref12">31</xref>
        ], the authors propose the Top-K Similarity Graph Framework (TKSGF) for
detecting intrusions in IoT networks. Unlike traditional graph methods based on physical
connections, TKSGF constructs graphs based on Top-K attribute similarity, which improves node
representation. GraphSAGE is used as a GNN model for scalable training. The influence of graph
directionality, K value, and GNN architectures is investigated. Experiments on the NF-ToN IoT and
NF-BoT IoT datasets show that TKSGF outperforms traditional ML methods and other graph-based
approaches in terms of accuracy and robustness. In the paper [
        <xref ref-type="bibr" rid="ref13">32</xref>
        ], the authors propose a new
approach to detecting intrusions in IoT networks by combining Self-Supervised Learning (SSL) and
Markov Graph Convolutional Network (MarkovGCN). This approach allows for effective work
with unbalanced data and new attacks with a small number of samples. SSL reduces dependence on
large labeled sets, while MarkovGCN detects network structures and enriches node and edge
features with context. Experiments on the EdgeIIoT-set dataset showed high performance
(Accuracy – 98.68%, Precision – 98.18%, Recall – 98.35%, F1 – 98.40%), outperforming traditional ML
methods. In the article [
        <xref ref-type="bibr" rid="ref14">33</xref>
        ], the authors analyze current methodologies for labeling network data in
the field of cybersecurity, emphasizing that most open datasets quickly become obsolete due to
changes in attacker behavior and the complexity of the labeling process. Common automated
methods generate synthetic traffic, hiding key features for distinguishing between normal and
malicious activity, while approaches involving non-experts are limited by data quality and volume.
The authors emphasize the need to develop a consistent labeling methodology for the continuous
creation of representative datasets, which is critical for the implementation of new ML and
statistical threat detection methods. In the study [
        <xref ref-type="bibr" rid="ref15">34</xref>
        ], the authors propose a new approach to IoT
security, using a graph algorithm to build a network model and then evaluate it using a GAT-based
intrusion detection system (IDS). This approach allows for the complex interrelationships between
IoT nodes to be taken into account. The NSL-KDD dataset was used to evaluate effectiveness, and
the analysis was performed using key metrics: F1-score, Recall, Accuracy, and Precision. The
results confirmed the high accuracy, scalability, and stability of GNN-IDS in countering modern
threats in IoT systems.
      </p>
      <p>
        The article [
        <xref ref-type="bibr" rid="ref16">35</xref>
        ] creates an optimized Long Short-Term Memory (LSTM) model for detecting
anomalies in network traffic using three hyperparameter optimization methods: Particle Swarm
Optimization (PSO), JAYA, and Salp Swarm Algorithm (SSA). The NSL-KDD, CICIDS, and BoT-IoT
datasets were used for the study. Performance was evaluated using the metrics Accuracy, Precision,
Recall, F-score, TPR, FPR, and ROC. A comparative analysis showed that SSA-LSTMIDS
outperforms other models on all three datasets, demonstrating the best accuracy and the lowest
false positive rate. The article [
        <xref ref-type="bibr" rid="ref17">36</xref>
        ] proposes an improved system for detecting intrusions in IoT
networks based on Self-Attention Progressive Generative Adversarial Network (SAPGAN). The
proposed approach involves collecting IoT data, preprocessing it with local least squares to recover
missing values, and selecting optimal features using a modified War Strategy Optimization
Algorithm (WSOA). Based on the selected features, traffic is classified as “Anomalous” or “Normal.”
Testing on various types of attacks (flood, DDoS, brute force, etc.) showed that SAPGAN
outperforms traditional models in accuracy by 18–27% and reduces computation time by 13–26%. In
the article [
        <xref ref-type="bibr" rid="ref18">37</xref>
        ], the authors propose a hybrid deep Attention-CNN-LSTM model for detecting
intrusions in networks, which combines Convolutional Neural Networks (CNN), Long Short-Term
Memory (LSTM), and a self-attention mechanism to extract the most informative features. CNN is
used to extract spatial features, while LSTM is used to model temporal dependencies. Testing on
the NSL-KDD and Bot-IoT datasets showed an accuracy of 94.8–97.5%, improving MCC and
F1score. The study confirmed the contribution of each component, especially the attention layer. The
model provides processing of over 1,200 records/s with a delay of less than 35 ms, making it
suitable for high-traffic environments. In the paper [
        <xref ref-type="bibr" rid="ref19">38</xref>
        ], the authors propose an IoT-enabled
Cyberattack Detection System (IoT-E-CADS) for detecting cyber threats in smart energy metering
infrastructure using machine learning methods. The two-level system first applies the Isolation
Forest algorithm to detect anomalies and attacks in real time, and then the Decision Tree algorithm
to identify cyberattacks and false data injections. The developed device was tested at Quantanics
TechServ Pvt. Ltd. (India) with 10 smart meters, where it successfully detected two simulated
attacks. The system achieved 95% accuracy, demonstrating its effectiveness for commercial use.
      </p>
      <p>
        The article [
        <xref ref-type="bibr" rid="ref20">39</xref>
        ] presents a new network intrusion detection system (NIDS) based on graph
neural networks, specifically the E-GraphSAGE model. The authors justify the use of GNN in this
field by the fact that network traffic flows are naturally represented in the form of a graph, which
allows for effective consideration of both the structural connections between nodes and the
characteristics of the connections themselves. The proposed approach allows for simultaneous
consideration of network topology and the characteristics of connections between devices for more
accurate detection of intrusions in IoT environments. Based on the results of experiments on four
relevant datasets, the model demonstrated superiority over modern methods in terms of key
classification metrics. The results confirm the effectiveness of GNN in anomaly detection and
highlight the promise of further research in this area.
      </p>
      <p>The article [40] discusses the problem of detecting network intrusions in Edge Computing
environments, where traditional methods often prove ineffective due to the complexity and
dynamism of network data. Although graph neural networks show potential in this area, most
existing solutions are based on simplified graph construction methods that do not reflect the real
behavioral relationships between nodes. This leads to overfitting, limited extraction of graph
information, and reduced classification accuracy, especially in multi-class scenarios. To address
these shortcomings, this paper proposes the BS-GAT method, a graph neural network with
attention that takes into account the behavioral similarity between nodes. A new approach to
graph construction is proposed, which integrates the weights of behavioral connections into the
attention mechanism, allowing for more effective consideration of both structural and contextual
information. The results of experiments on modern datasets confirm the effectiveness of the model:
in binary classification, all key metrics exceed 99%, and in the multi-class case, the accuracy
exceeds 93%, which indicates a significant advantage of the proposed approach over existing
solutions. The study [41] addresses the issue of intrusion detection in Internet of Things (IoT)
networks, where the high complexity and heterogeneity of the environment pose significant
challenges for building effective protection systems. Although graph-based deep learning methods
are already showing promise in the field of cybersecurity, most existing approaches form graphs
based on physical connections, which does not always adequately reflect the relationships between
nodes. This paper proposes a new concept, the Top-K Similarity Graph Framework (TKSGF), in
which the graph is constructed based on the similarity of node attributes rather than physical
connections. The GraphSAGE model is used to extract node representations, which allows for
scalability. Study [42] investigates the problem of automatically detecting malicious outbound
traffic from IoT devices. The authors tested several combinations of neural networks (CNN, LSTM,
CNN-LSTM) on KDDCup99, NSL-KDD, UNSW-NB15, WSN-DS, and CICIoT2023 datasets. The
CNN-LSTM configuration performed best — achieving up to 96% accuracy and 0.94 F1 score with
low false positive rates. The authors note that combined spatial and temporal feature extraction
ensures stability even in the presence of data imbalance, though highly resource-intensive models
may be difficult to deploy in edge scenarios.</p>
      <p>The authors of [43] proposed a fuzzy inference-based network traffic analysis system that uses
only packet headers for classification (no payload). They defined nine linguistic variables and a set
of if-then rules for TCP-SYN flood and other attacks. Results show high classification effectiveness:
outperforming traditional binary fuzzy methods while reducing the load on network infrastructure.
However, the solution has scalability limitations for complex attacks and requires enhancement of
the rule knowledge base. In [44], the issue of network attack detection in cyber-physical systems is
addressed using rule-based logical neural networks. The authors implemented an IDS solution that
analyzes multivariate time series from sensors directly through a combination of logical rules and
neural elements. The model is adapted to heterogeneous cyber-physical environments and showed
higher classification accuracy compared to traditional statistical and rule-based approaches. In [45],
a method for anomaly detection in IoT device traffic is proposed based on a modified Z-index,
which does not require model training or labeled data. The approach builds a profile of normal
device behavior, uses median and MAD for noise and outlier resistance, and applies exponential
smoothing and cumulative deviation indices to detect both short- and long-term anomalies. The
practical implementation with generated logs (4804 devices) showed up to 91% accuracy for
interval-based anomalies, with an average F1 score ≈ 0.86. The method is attack-type independent,
operates in real-time, and is suitable for resource-limited devices. A weak point remains its
sensitivity to recurring patterns, which are difficult to detect without additional contextual
analysis.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Formalization of IoT network structure and attack vectors in the form of a graph</title>
      <p>Present a system for detecting multi-vector attacks on an IoT network in the form of a graph that
formalizes its topology, functional relationships, and the dynamics of interactions between devices.
This approach will allow for the effective use of graph attention networks (GAT) for analyzing
traffic structure, detecting anomalies, and modeling potential attack vectors. Figure 1 shows a
general scheme of the mesh IoT network and attacks on the network.</p>
      <p>Based on the presented mesh topology, the IoT network is described as a directed weighted
graph:
(1)
where each component performs its function in the graph structure. The set of nodes is denoted
as V, the set of edges as E.</p>
      <p>For analytical modeling, the following additional components are added:
• X ∈ R|V|×d – a matrix of node features, where is the number of descriptors or parameters
describing each node
• A∈ {0,1}|V|×|V| – a binary adjacency matrix indicating the presence or absence of a
connection between nodes
• W : E → R+ – a weight function on the edges that specifies the strength or priority of the
connection between nodes</p>
      <p>The set of nodes V in the graph model of the IoT network includes three categories of elements:
end devices V ED, routers V R and critical network nodes V R. The V ED group includes sensors,
actuators and other devices that generate or consume data – they are the most numerous and
vulnerable to attacks. V R nodes are responsible for routing traffic between end devices and higher
levels of the network, forming the main framework of the mesh structure. V C nodes, in particular
C1, act as data concentration points or gateways connecting the local network with analysis and
management systems. This structure allows you to model functional relationships and risk areas
within the framework of detecting multi-vector attacks.</p>
      <p>The nodes are divided into three functional groups:
• V ED – end devices ed1 , ed2 , … , edn
• V R – routers R1 , R2 , … , Rn
• V C – controllers (control units / gateways) C1
Let's write the total set of nodes:</p>
      <p>V =V ED∪ V R∪ V C</p>
      <p>The set of edges E represents all possible connections between network nodes and reflects both
the physical and logical topology of interactions. Each edge eij=(υi , υ j)∈ E reflects the transfer of
information or control commands from node υi to node υ j To describe different directions of
interaction in the IoT system, the set of edges is divided into two disjoint subsets - internal and
external connections. Eint – internal connections between nodes within the IoT segment Eext –
external logical connections from V C controllers to external systems, such as a control center or
ML module. Physical edges within Eint can be implemented via wireless technologies such as
ZigBee, BLE, LoRa or other low-power protocols. Eext edges, on the other hand, operate over
IPoriented protocols (e.g., MQTT or HTTPS) and connect controllers to cloud infrastructure or
higher-level systems. This separation allows us to separate local (network) interaction channels
from channels leading to external objects, including interfaces to cloud systems, gateways, or
control controllers. Formally, this is specified as follows:</p>
      <p>E= Eint∪ Eext , Eint ∩ Eext= R</p>
      <p>Thus, the set E includes both local routes that provide telemetry and command transmission,
and global channels through which integration with the outside world is implemented.</p>
      <p>The interaction between the nodes of the set V is implemented through directed edges of the set
E, which form routes for transmitting data, commands, and control logic within the network and
outside. The end devices V ED generate telemetry, which is transmitted to the routers V R through
the edges:
(2)
(3)
(4)</p>
      <p>To display the logical connections of the IoT network with external information systems, a set
of logical (non-physical) nodes is introduced:</p>
      <p>V ext={υ1ext , υ2ext , … , υnext }
(5)
where υnext are nodes such as a ML engine for data processing, a security event control center
(CHCC), a cloud storage, or a central telemetry collection server. They are not part of the physical
topology of the IoT segment, but act as endpoints for logical communication channels. Thus,
external edges are defined as:</p>
      <sec id="sec-3-1">
        <title>Eint⊆ V C V ext</title>
        <p>(6)</p>
        <p>That implement the transition from IoT protocols to IP-oriented technologies. In the reverse
direction, control commands can flow through V C and V R to the actuators in V ED. Thus, the edges
in the graph not only reflect physical or logical connections, but also determine the permissible
paths for data circulation between network subsystems, taking into account the limitations of
protocols, topology and security policies (Figure 2).</p>
        <p>Within the graph model of the IoT network, each attack vector is considered as a
transformation of the basic structure of the graph G that describes the current state of the system.
In this graph, the node set V includes all devices in the network, the edge set E represents the
directed links between them, the matrix X ∈ R|V|× F contains the numerical attributes of each node,
the adjacency matrix A∈ R|V|×|V| reflects the presence of links, and the vector W ∈ RF (specifies
the weights or importance of the edges (for example, bandwidth or channel reliability). Each attack
vector α k is a targeted action that modifies one or more of these sets, leading to a new state of the
network G , potentially unstable or vulnerable.</p>
        <p>In IoT systems, attacks are almost never limited to a single vector of influence. Due to the
complexity of the topology, the branched network structure, the presence of diverse device types,
and the multi-level control model, security breaches often have a combined nature. Attackers
employ multiple strategies – either simultaneously or sequentially – by targeting end devices,
routers, communication channels, and control nodes. This defines the category of multi-vector
attacks.</p>
        <p>A multi-vector attack involves several directions of influence that reinforce each other. For
instance, compromising a sensor may enable influence over a router, which in turn may provide
access to the gateway. Such chained effects are extremely difficult to detect when events are
analyzed in isolation. Therefore, an integrated model is required that can formalize both individual
vectors of influence and their combinations. With in the proposed model, three fundamental types
of attack vectors are distinguished:
(7)
(9)
α multi=α ED+α c h+α ctrl</p>
        <p>Where α ED denotes the compromise of an end device, α c h represents an attack on the data
transmission channel, and α ctrl refers to interference with the operation of a controller or gateway.
In this expression, each component corresponds to a specific functional domain of the IoT network.
Collectively, they model a chain attack, which may begin, for example, with the compromise of an
end device and culminate in the takeover of the system’s control logic.</p>
        <p>A matrix representation was used to analyze impact scenarios. This approach made it possible
to formalize the relationships between all network components and assess the intensity and
direction of impact. It also made it possible to identify critical escalation paths.</p>
        <p>M a=(m j) , mi , j∈ ΩED ,c h ,ctl i , j=1 … n
(8)
where M α is the mutual influence matrix within the IoT system.</p>
        <p>Each element of this matrix, m_(i,j), reflects the presence and type of influence between
component Fi and F j. If influence exists, it is defined by a type from a predefined set that includes
the three main categories of attack vectors. Thus, the matrix not only captures the existence of
interactions but also classifies them according to the source of the attack.</p>
        <p>Ω=Ωed , Ωc h , Ωctrl</p>
        <p>The Ω set represents three main categories of attack vectors within an IoT network. Ωed refers
to compromises targeting end devices (sensor data tampering, data injection, malware installation).
Ωc h refers to attacks on communication channels (packet interception, traffic redirection). Ωc h
covers manipulations targeting control blocks or gateways. Each subset reflects a separate level of
impact. This allows for the formalization of escalation scenarios at different levels of the IoT
system.</p>
        <p>Each subset covers typical attack operations at the corresponding level – from data interception
to manipulation of control logic. To provide a more detailed view of the components, a block
structure of the IoT system was introduced.</p>
        <p>The matrix M IT describes the modular structure of the IoT system, where each logical
subsystem Fi consists of a set of subcomponents Fi ,k, where i=0. . N IT. The number of such
subsystems is defined by the parameter N IT, which represents the total number of functional
blocks in the network. In turn, AIT , i denotes the set of compromised areas, formed as a union of all
locally affected components that belong to the corresponding Fi. The resulting impact matrix can
be expressed as:</p>
        <p>M r=(
mr ,1,1</p>
        <p>⋮
mr ,1, NIT ,1
⋯
⋱
⋯
mr ,1, N VP</p>
        <p>⋮
mr , NIT , N VP</p>
        <p>T ={T i|υi∈ V }
T i={ti1 , ti2 , … , tiτ }, tik∈ Rd
(10)
(11)
(12)
where mr ,i , j is a numerical or logical estimate of the impact from the i-th element on the j-th
object, N IT is the number of logical subsystems, and N VP is the number of vulnerable objects in the
system.</p>
        <p>This formalization reflects the structure of risks and allows building an automated analysis
system that identifies nodes with the highest number of incoming and outgoing connections. It also
assesses critical attack propagation paths and supports scenario testing for protection mechanisms.
Representing a multi-vector attack as a graph allows us to move from an intuitive description to a
formalized model. This model covers the structural and behavioral characteristics of an IoT
network. Such formalization is a basic prerequisite for creating an effective mechanism for
detecting and responding to complex compromise scenarios.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Telemetry modeling and feature extraction</title>
      <p>To link the formal topology with the actual dynamics of events in the network, we introduce the
set T, which represents telemetry data describing the current parameter values of devices in the
network over a given time period. This telemetry serves as the primary source of information for
constructing feature vectors xi, evaluating node states, and identifying behavioral anomalies. We
define the set T as follows:
where each T i is a time series of measurements for node υi and has the following form:
where τ is the number of time points, and d is the number of parameters (features) recorded by
the device at each time step k; for example, RSSI, CPU load, latency, battery level, etc.</p>
      <p>These time series reflect the behavior of devices in the network and form the foundation for
constructing node feature vectors xi, analyzing network state, and detecting anomalies using
statistical methods and the model. Since the set T contains dynamic elements, we do not use the
entire series but only selected fragments within a fixed time interval [ t a , t b ], introducing a
temporally localized subset of telemetry:</p>
      <p>The description of the set of telemetry vectors T [ta,tb] provides information about the behavior of
each node in the IoT network within the specified time interval. It allows for the assessment of
both local and global changes in network state, detection of deviations in device parameters, and
construction of a structured model G[ta,tb] used for anomaly detection. The feature vector xi
summarizes the telemetry data of node υi∈ V over the interval [ t a , t b ], characterizing its functional
state based on metrics tik. It serves as input to the GAT model used for analyzing and detecting
anomalies.</p>
      <p>xi=[ POWER LIMIT ]∈ R</p>
      <p>RSSI
LATENSY</p>
      <p>CPU
…</p>
      <p>M
(15)
W ij={link metric if (υi , υ j)∈ E )
0 , otherwise
(14)
(16)
(17)</p>
      <p>The content of the feature vector xi depends on the type of node and the set of available
telemetry metrics. It may include parameters such as RSSI, latency, CPU usage, packet loss, power
consumption, battery level, queue size, or other device state indicators. If needed, the feature set
may also include latent characteristics obtained using an autoencoder or other dimensionality
reduction techniques. The features are formed based on aggregated telemetry values over the time
interval [ t a , t b ], for example, by calculating the mean, variance, maximum, or trend.</p>
      <p>The structure of the graph G[ta,tb],, which represents the relationships between nodes of the IoT
system within the specified time interval, is constructed by forming the edge set E⊆ V × V , where
each edge ei , j=( υi , υ j ) denotes the presence of a data transmission channel or logical interaction
between devices υi and υ j. Using the adjacency matrix Aij, we represent the structure of the graph
required for computations in the GAT model, allowing us to define the connections between nodes
and control the flow of information within the neural network.</p>
      <p>Aij={</p>
      <sec id="sec-4-1">
        <title>1 , if there exists an edge ei , j∈ E between nodes υi and υ j</title>
        <p>0 , otherwise</p>
        <p>Aij=1 indicates that node υi transmits information and υ j receives it during neural network
computations. To provide a more accurate description of node interactions, a weight matrix</p>
        <p>W ∈ Rn×n is introduced, where the weight W ij represents the degree of influence from node υ_i
to υ j:</p>
        <p>The weight value is based on the characteristics of the data transmission channels and the
behavioral parameters of the node.</p>
        <p>For the generalized representation of node υi, obtained after passing through n layers of the
GAT, we define the vector hi xij. It integrates the local behavior of the node (telemetry, features)
and the structured context (interactions with neighboring nodes and their features).
h(i n+1)=σ
( j∈∑N (i)
a(ijn) W (n) h(n)
j )
(18)</p>
        <p>At each GAT layer, the new representation of node υi at level n+1 is computed as a nonlinear
representation of the weighted sum of its neighbors’ features. Aggregation weights are determined
using the attention mechanism, which dynamically defines the importance of each nodeυ j∈ N ( i )
in the context of υi. The evaluation mechanism is activated by a nonlinear function σ (ReLU або
ELU), and a(ijn) defines the attention coefficient of nodeυ j with respect to υi.</p>
        <p>The threshold value θ for anomaly decision-making can be either fixed or adaptive. In certain
scenarios, it is appropriate to use statistical or quantile-based approaches that take into account the
current distribution of scoring values in the network. This enables better adaptation to changing
system conditions. The interpreter makes the anomaly decision for the representation of node υi
according to the algorithm described below.</p>
        <sec id="sec-4-1-1">
          <title>Algorithm 1 Workflow inference-based anomaly detection using GAT-interpreter</title>
          <p>Require:
Graph representation
G=(V , E , X ) , GAT −generated node embeddings hi∈ Rd
Ensure:
Anomaly detection result yi∈ {0,1 } for each node υi∈ V
1: Begin
2: Input data preprocessing
3:Extract telemetry T [ta,tb] and compute embedding hi via
trained GAT model
4: Score calculation
5: For each node υi∈ V , compute anomaly score:
6: si=hi , Ci
15: Output classification vector ⃗y =[ y1 , y1 , … , y1n]
16: End</p>
          <p>The decision-making algorithm implements the classification rule for the behavior of network
node υi, based on the feature vector hi generated after passing through the GAT block. A scoring
function is used to produce a numerical value s_i that reflects the degree of deviation in the node's
behavior in the context of its neighbors. The decision is made by comparing s_i with an adaptive or
fixed threshold θi, calculated using statistical rules as θi= μs+ λ ∙ σ s. As a result, a classification
label yi∈ {0,1 } is assigned, where 1 indicates an anomaly and 0 corresponds to a normal node
state.</p>
          <p>The GAT model is refined by adjusting its parameters based on the observed behavior of nodes
in the IoT network. Training is performed iteratively as follows: at each step, the network receives
input feature vectors xi and generates corresponding representations hi, which are then analyzed
by the interpretation module. The obtained results are compared against expected labels or
statistical references.</p>
        </sec>
        <sec id="sec-4-1-2">
          <title>Algorithm 2: Workflow training module for GAT-based anomaly detection</title>
          <p>Require:
Graph structure G=(V , E , X ), telemetry dataset T [ta,tb]
initialized GAT model
Ensure:
Trained GAT model with optimized parameters W , aij
1: Begin
2: Preprocess telemetry data T [ta,tb] to generate node features
X ={ x1 , x2 , … , xn }
3: Construct graph G=(V , E , X )
4: Initialize GAT model parametersW and attention weights
aij
5: for each e∈ {1 , … , E } do
6: for each node υi∈ do
7: Compute node embedding hi using GAT
8: Infer anomaly score or label yi
9: end for
10: Compute lossL(h,y) (binary cross-entropy)
11: Back propagate gradients and update W , aij
12: end for
13: Output: Trained GAT model
14: End</p>
          <p>To optimize the model parameters, a binary cross-entropy loss function L(h,y) is used, which
allows for an accurate assessment of the discrepancy between the predicted and expected anomaly
values at each training step.</p>
          <p>Figure 3 presents the proposed architecture of the GAT-based anomaly detection model for IoT
networks. It is built upon the coordinated interaction of three core components: the converter, the
interpreter, and the training module. Input data in the form of telemetry T [ta,tb] enters the system
through a data collection pipeline. The converter generates a feature vector xi that reflects the
functional state of the node within the specified time interval. The interpreter then constructs the
representation hi using the attention mechanism, which takes into account both the node’s local
features and the structure of its neighborhood in the graph. This representation is passed to the
training module, which estimates the probability of anomalous behavior and optimizes the model
using the loss function.</p>
          <p>The simulation results demonstrate that combining the structural representation of the IoT
network with telemetry interpretation via a GAT model enables the construction of a flexible
mechanism for detecting complex, multi-vector attacks.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Evaluation of the effectiveness of the method</title>
      <p>In the course of the experimental modeling, both publicly available and synthetically generated IoT
datasets were utilized. Public datasets such as UNSW BoT-IoT were used at the initial stage for
baseline evaluation, while a custom-generated dataset was employed to simulate ZigBee-based
telemetry from low-power IoT devices. The synthetic data included frame-level attributes (e.g.,
RSSI, LQI, sequence number) and was created using a controlled Python-based simulation pipeline.
The datasets cover a wide range of parameters including wireless signal characteristics,
devicelevel metrics, behavioral anomalies, and logical communication patterns, and include labeled
instances of various attacks such as DoS, spoofing, scanning, privilege escalation, and data
poisoning.</p>
      <p>For the purposes of this study, each dataset was preprocessed and transformed into a
graphbased format, where nodes represent IoT devices and edges represent communication channels
(physical or logical). Node attributes include both telemetry data and signature-based features,
which serve as input to the graph neural network.</p>
      <p>Figure 4 illustrates the sequential transformation of raw IoT telemetry into feature vectors
suitable for processing by graph neural networks. The first block contains raw dataset values such
as CPU, RAM, network traffic, protocol, and class labels.</p>
      <p>The second block shows the normalized form of the feature vectors xi, corresponding to the first
level of preprocessing: percentage values of CPU and RAM were converted to numerical form
(from 0 to 1), and packet count values were scaled.</p>
      <p>The third block illustrates the formation of hidden-space vectors hi, obtained through a linear
transformation of the features xi (emulating the weighted aggregation mechanism in GAT). Each
vector becomes part of the subsequent aggregation process within the device's subgraph.</p>
      <p>This output represents the final result of the model’s forward pass on a single data batch,
enabling the computation of the loss function and subsequent training.</p>
      <p>Figure 5 shows a visualization of the transition from a time series of network traffic to the graph
representation of IoT devices.</p>
      <p>On the left, the time series of the feature pkt_count (packet count) for individual devices is
shown; red dots indicate anomalous nodes. On the right, a constructed graph is presented, where
each vertex corresponds to a device and edges reflect feature similarity in the hidden space. This
transformation serves as the basis for further processing by the graph neural network.</p>
      <p>Figure 6 illustrates the processing results of IoT devices within the graph neural network across
multiple training epochs. Each row originally corresponded to a single network device at a specific
point in time. The vectors h1 , h2 , h3 represent the hidden features of the node, formed based on its
local neighborhood in the graph.</p>
      <p>During the experimental modeling, the model’s classification performance was also evaluated
based on the learned node representations hi. The model’s ability to correctly determine whether a
node belongs to the "normal" or "anomalous" class within the graph structure was assessed.
Standard classification metrics were used for this purpose: accuracy, recall, precision, F1-score, and
ROC-AUC — the latter capturing model stability under varying decision thresholds.</p>
      <p>A comparison of four graph-based models was performed, namely GCN, GraphSAGE, GAE, and
the proposed GAT. The results of the performance comparison are presented in Table 1 and Figure
7.</p>
      <p>The GCN model demonstrates an accuracy of 0.93 and an F1-score of 0.92, indicating its
effectiveness in tasks with clearly defined classes. GraphSAGE shows only a slight decrease in
accuracy while maintaining stable recall and precision values. GAE, being an autoencoder-based
model, underperforms across all metrics but remains suitable for unsupervised learning.</p>
      <p>GAT, although ranking second or third across most metrics, achieves the highest ROC-AUC
value of 0.955. This highlights its strong ability to distinguish between normal and anomalous
nodes under varying threshold conditions. These results suggest that GAT has substantial potential
for analyzing long-term behavioral trends in network structures, despite some decline in local
classification accuracy.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The proposed approach to detecting multi-vector attacks in IoT networks is based on the use of
graph attention networks. This allows for the structural properties of the network and the
behavioral characteristics of devices to be taken into account. Building a graph model using
telemetry and structural connections, along with applying attention mechanisms for weighted
aggregation of information, ensures high sensitivity to complex multi-vector attacks. Experimental
results have shown that the GAT model is capable of effectively detecting attacks. A comparative
analysis with other GNN-based models confirmed the competitiveness of GAT in anomaly
detection tasks. In future work, the main focus will be on improving the accuracy of the model and
the value of the F1-score.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>AI tools were used solely as translation and proofreading aids. All content was originally
authored by the submitting party.
[2] S. S. I. Samuel, A review of connectivity challenges in IoT-smart home, in: 2016 3rd MEC
International Conference on Big Data and Smart City (ICBDSC), IEEE, 2016.
doi:10.1109/icbdsc.2016.7460395.
[3] M. S. Farooq, S. Riaz, A. Abid, T. Umer, Y. B. Zikria, Role of IoT Technology in Agriculture: A</p>
      <p>Systematic Literature Review, Electronics 9.2 (2020) 319. doi:10.3390/electronics9020319.
[4] J. Xu, B. Gu, G. Tian, Review of agricultural IoT technology, Artif. Intell. Agric. 6 (2022) 10–22.</p>
      <p>doi:10.1016/j.aiia.2022.01.001.
[5] Y. Song, F. R. Yu, L. Zhou, X. Yang, Z. He, Applications of the Internet of Things (IoT) in Smart</p>
      <p>Logistics: A Comprehensive Survey, IEEE Things J. (2020) 1. doi:10.1109/jiot.2020.3034385.
[6] C. Caballero-Gil, J. Molina-Gil, P. Caballero-Gil, A. Quesada-Arencibia, IoT Application in the
Supply Chain Logistics, in: Computer Aided Systems Theory - EUROCAST 2013, Springer
Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 55–62. doi:10.1007/978-3-642-53862-9_8.
[7] S. Selvaraj, S. Sundaravaradhan, Challenges and opportunities in IoT healthcare systems: a
systematic review, SN Appl. Sci. 2.1 (2019). doi:10.1007/s42452-019-1925-y.
[8] B. Farahani, F. Firouzi, K. Chakrabarty, Healthcare IoT, in: Intelligent Internet of Things,</p>
      <p>Springer International Publishing, Cham, 2020, pp. 515–545. doi:10.1007/978-3-030-30367-9_11.
[9] Z. Lv, B. Hu, H. Lv, Infrastructure Monitoring and Operation for Smart Cities Based on IoT</p>
      <p>System, IEEE Trans. Ind. Inform. 16.3 (2020) 1957–1962. doi:10.1109/tii.2019.2913535.
[10] R. Sharma, Evolution in Smart City Infrastructure with IOT Potential Applications, in:
Intelligent Systems Reference Library, Springer International Publishing, Cham, 2018, pp. 153–
183. doi:10.1007/978-3-030-04203-5_8.
[11] Koroliuk, R., Nykytyuk, V., Tymoshchuk, V., Soyka, V., Tymoshchuk, D. Automated
monitoring of bee colony movement in the hive during winter season. CEUR Workshop
Proceedings, 2024, 3842, pp. 147-156
[12] T. L. Narayana, C. Venkatesh, A. Kiran, C. B. J, A. Kumar, S. B. Khan, A. Almusharraf, T.</p>
      <p>Quasim, Advances in real time smart monitoring of environmental parameters using IoT and
sensors, Heliyon (2024) e28195. doi:10.1016/j.heliyon.2024.e28195.
[13] Didych, I., Mykytyshyn, A., Stanko, A., Mytnyk, M. Application of machine learning methods
to the prediction of NO2 concentration in the air environment. CEUR Workshop Proceedings,
2024, 3896, pp. 569–577
[14] D. Tymoshchuk, O. Yasniy, P. Maruschak, V. Iasnii, I. Didych, Loading frequency classification
in shape memory alloys: A machine learning approach, Computers 13.12 (2024) 339.
doi:10.3390/computers13120339.
[15] Stukhliak, P., Totosko, O., Stukhlyak, D., Vynokurova, O., &amp; Lytvynenko, I. (2024). Use of
neural networks for modelling the mechanical characteristics of epoxy composites treated
with electric spark water hammer. CEUR Workshop Proceedings, 3896, 405–418.
[16] O. Yasniy, D. Tymoshchuk, I. Didych, V. Iasnii, I. Pasternak, Modelling the properties of shape
memory alloys using machine learning methods, Procedia Struct. Integr. 68 (2025) 132–138.
doi:10.1016/j.prostr.2025.06.033.
[17] Stukhliak, P., Martsenyuk, V., Totosko, O., Stukhlyak, D., &amp; Didych, I. (2024). The use of neural
networks for modeling the thermophysical characteristics of epoxy composites treated with
electric spark water hammer. CEUR Workshop Proceedings, 3742, 13–24.
[18] O. Yasniy, P. Maruschak, A. Mykytyshyn, I. Didych, D. Tymoshchuk, Artificial intelligence as
applied to classifying epoxy composites for aircraft, Aviation 29.1 (2025) 22–29.
doi:10.3846/aviation.2025.23149.
[19] O. Chukur, N. Pasyechko, A. Bob, A. Sverstiuk, Prediction of climacteric syndrome
development in perimenopausal women with hypothyroidism, Menopausal Rev. (2022).
doi:10.5114/pm.2022.123522.
[20] S. O. Nykytyuk, A. S. Sverstiuk, D. S. Pyvovarchuk, S. I. Klymnyuk, A multifactorial model for
predicting severe course and organ and systems damage in Lyme borreliosis in children, Mod.</p>
      <p>Pediatr. Ukr. No. 2(130) (2023) 6–16. doi:10.15574/sp.2023.130.6.
[40] Y. Wang, Z. Han, Y. Du, J. Li, X. He, BS-GAT: a network intrusion detection system based on
graph neural network for edge computing, Cybersecurity 8.1 (2025).
doi:10.1186/s42400-02400296-8.
[41] T. Ngo, J. Yin, Y.-F. Ge, H. Wang, Optimizing IoT Intrusion Detection—A Graph Neural
Network Approach with Attribute-Based Graph Construction, Information 16.6 (2025) 499.
doi:10.3390/info16060499.
[42] Klots Y., Petliak N., Martsenko S., Tymoshchuk V., Bondarenko I. Machine Learning system for
detecting malicious traffic generated by IoT devices. CEUR Workshop Proceedings, 2024, 3742,
pp. 97 – 110
[43] Petliak N., Klots Y., Titova V., Salem A.-B.M. Attack detection system based on network traffic
analysis by means of fuzzy inference. CEUR Workshop Proceedings, 2024, 3899, pp. 201 – 213
[44] Titova, V., Klots, Y., Cheshun, V., Petliak, N., Salem, A.-B.M. Detection of network attacks in
cyber-physical systems using a rule-based logical neural network. CEUR Workshop
Proceedings, 2024, 3736, pp. 255–268
[45] Stetsiuk, M., Anikin, V., Pyrch, O., Kozelskiy, O., Salem, A.-B.M. Method of detecting
anomalies in IOT device traffic based on statistical analysis using the modified z score. CEUR
Workshop Proceedings, 2025, 3963, pp. 284–298</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C.</given-names>
            <surname>Paul</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ganesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sunitha</surname>
          </string-name>
          ,
          <article-title>An overview of IoT based smart homes</article-title>
          ,
          <source>in: 2018 2nd International Conference on Inventive Systems and Control (ICISC)</source>
          , IEEE,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1109/icisc.
          <year>2018</year>
          .
          <volume>8398858</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nykytyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sverstiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Klymnyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pyvovarchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Palaniza</surname>
          </string-name>
          ,
          <article-title>Approach to prediction and receiver operating characteristic analysis of a regression model for assessing the severity of the course Lyme borreliosis in children</article-title>
          ,
          <source>Rheumatology</source>
          <volume>61</volume>
          .5 (
          <year>2023</year>
          )
          <fpage>345</fpage>
          -
          <lpage>352</lpage>
          . doi:
          <volume>10</volume>
          .5114/reum/173115.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>N.</given-names>
            <surname>Nazareth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. Y.</given-names>
            <surname>Ramana Reddy</surname>
          </string-name>
          ,
          <article-title>Financial applications of machine learning: a literature review, Expert Syst</article-title>
          .
          <source>With Appl</source>
          . (
          <year>2023</year>
          )
          <article-title>119640</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2023</year>
          .
          <volume>119640</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Wei-Yang</surname>
            <given-names>Lin</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ya-Han</surname>
            <given-names>Hu</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chih-Fong</surname>
            <given-names>Tsai</given-names>
          </string-name>
          ,
          <source>Machine Learning in Financial Crisis Prediction: A Survey</source>
          ,
          <source>IEEE Trans. Syst</source>
          .,
          <string-name>
            <surname>Man</surname>
          </string-name>
          , Cybern.,
          <string-name>
            <surname>C (</surname>
          </string-name>
          <article-title>Appl</article-title>
          . Rev.)
          <volume>42</volume>
          .4 (
          <year>2012</year>
          )
          <fpage>421</fpage>
          -
          <lpage>436</lpage>
          . doi:
          <volume>10</volume>
          .1109/tsmcc.
          <year>2011</year>
          .
          <volume>2170420</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mashrur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Luo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Zaidi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Robles-Kelly</surname>
          </string-name>
          ,
          <article-title>Machine Learning for Financial Risk Management: A Survey, IEEE Access 8 (</article-title>
          <year>2020</year>
          )
          <fpage>203203</fpage>
          -
          <lpage>203223</lpage>
          . doi:
          <volume>10</volume>
          .1109/access.
          <year>2020</year>
          .
          <volume>3036322</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>D.</given-names>
            <surname>Tymoshchuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Didych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Maruschak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yasniy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mykytyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mytnyk</surname>
          </string-name>
          ,
          <source>Machine Learning Approaches for Classification of Composite Materials, Modelling</source>
          <volume>6</volume>
          .4 (
          <year>2025</year>
          )
          <article-title>118</article-title>
          . doi:
          <volume>10</volume>
          .3390/modelling6040118.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Yasniy</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tymoshchuk</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Didych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zagorodna</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Malyshevska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>Modelling of automotive steel fatigue lifetime by machine learning method</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2024</year>
          ,
          <volume>3896</volume>
          , pp.
          <fpage>165</fpage>
          -
          <lpage>172</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>C.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Took</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.-K. Seong</surname>
          </string-name>
          ,
          <article-title>Machine learning in biomedical engineering</article-title>
          , Biomed. Eng.
          <source>Lett. 8</source>
          .
          <issue>1</issue>
          (
          <issue>2018</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          . doi:
          <volume>10</volume>
          .1007/s13534-018-0058-3.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Tymoshchuk</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yasniy</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mytnyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zagorodna</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tymoshchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Detection and classification of DDoS flooding attacks by machine learning method</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2024</year>
          ,
          <volume>3842</volume>
          , pp.
          <fpage>184</fpage>
          -
          <lpage>195</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>A.</given-names>
            <surname>Handa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Shukla</surname>
          </string-name>
          ,
          <article-title>Machine learning in cybersecurity: A review, WIREs Data Min</article-title>
          .
          <source>Knowl. Discov. 9</source>
          .
          <issue>4</issue>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1002/widm.1306.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Lypa</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horyn</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zagorodna</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tymoshchuk</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lechachenko</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>Comparison of feature extraction tools for network traffic data</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2024</year>
          ,
          <volume>3896</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>T.</given-names>
            <surname>Ngo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-F.</given-names>
            <surname>Ge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>Optimizing IoT Intrusion Detection-A Graph Neural</surname>
          </string-name>
          <article-title>Network Approach with Attribute-Based Graph Construction</article-title>
          ,
          <source>Information 16.6</source>
          (
          <year>2025</year>
          )
          <article-title>499</article-title>
          . doi:
          <volume>10</volume>
          .3390/info16060499.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ben Atitallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Driss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Boulila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koubaa</surname>
          </string-name>
          .
          <article-title>Enhancing Internet of Things Security through Self-Supervised Graph Neural Networks</article-title>
          .
          <source>In: Computer Systems and Information Technologies</source>
          ,
          <volume>2</volume>
          (
          <year>2024</year>
          )
          <fpage>14</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2412.13240.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Guerra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Catania</surname>
          </string-name>
          , E. Veas,
          <article-title>Datasets are not Enough: Challenges in Labeling Network Traffic, Comput</article-title>
          . &amp;
          <string-name>
            <surname>Secur.</surname>
          </string-name>
          (
          <year>2022</year>
          )
          <article-title>102810</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.cose.
          <year>2022</year>
          .
          <volume>102810</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Ahanger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Masoodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Salau</surname>
          </string-name>
          ,
          <article-title>Advanced intrusion detection in internet of things using graph attention networks</article-title>
          ,
          <source>Sci. Rep</source>
          .
          <volume>15</volume>
          .1 (
          <year>2025</year>
          ).
          <source>doi:10.1038/s41598-025-94624-8.</source>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>N.</given-names>
            <surname>Dash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chakravarty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Rath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. C.</given-names>
            <surname>Giri</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. M. AboRas</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Gowtham</surname>
          </string-name>
          ,
          <article-title>An optimized LSTM-based deep learning model for anomaly network intrusion detection</article-title>
          ,
          <source>Sci. Rep</source>
          .
          <volume>15</volume>
          .1 (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .1038/s41598-025-85248-z.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kantharaju</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Suresh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Niranjanamurthy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. I.</given-names>
            <surname>Ansarullah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Amin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alabrah</surname>
          </string-name>
          ,
          <article-title>Machine learning based intrusion detection framework for detecting security attacks in internet of things</article-title>
          ,
          <source>Sci. Rep</source>
          .
          <volume>14</volume>
          .1 (
          <year>2024</year>
          ).
          <source>doi:10.1038/s41598-024-81535-3.</source>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [37]
          <string-name>
            <surname>A. M. Alashjaee</surname>
          </string-name>
          ,
          <article-title>Deep learning for network security: an Attention-CNN-LSTM model for accurate intrusion detection</article-title>
          ,
          <source>Sci. Rep</source>
          .
          <volume>15</volume>
          .1 (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .1038/s41598-025-07706-y.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>K.</given-names>
            <surname>Naveeda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M. H. S. S.</given-names>
            <surname>Fathima</surname>
          </string-name>
          ,
          <article-title>Real-time implementation of IoT-enabled cyberattack detection system in advanced metering infrastructure using machine learning technique</article-title>
          ,
          <source>Electr. Eng</source>
          . (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .1007/s00202-024-02552-z.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>W.W.</given-names>
            <surname>Lo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Layeghy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sarhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gallagher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Portmann. E-GraphSAGE: A Graph Neural</surname>
          </string-name>
          <article-title>Network based Intrusion Detection System for IoT</article-title>
          .
          <source>In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS</source>
          <year>2022</year>
          ), Budapest, Hungary,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/NOMS54207.
          <year>2022</year>
          .9789878
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>